Results 1 to 10 of about 6,144,595 (375)

The final step of 40S ribosomal subunit maturation is controlled by a dual key lock [PDF]

open access: yeseLife, 2021
Preventing premature interaction of pre-ribosomes with the translation apparatus is essential for translational accuracy. Hence, the final maturation step releasing functional 40S ribosomal subunits, namely processing of the 18S ribosomal RNA 3′ end, is ...
Laura Plassart   +12 more
doaj   +3 more sources

Entropy driven key-lock assembly [PDF]

open access: yesThe Journal of Chemical Physics, 2010
The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations.
F. Jiménez-Ángeles   +4 more
core   +6 more sources

Two-piece obturator using “lock-and-key” mechanism

open access: diamondThe Journal of Indian Prosthodontic Society, 2017
This paper describes a method used for the fabrication of a two-piece denture obturator for a patient who had surgical removal of the premaxilla due to squamous cell carcinoma. The patient had been wearing a two-piece obturator but encountered difficulty
Prema Sukumaran, Michael R Fenlon
doaj   +3 more sources

Implementation of Suitcase Lock Security System Using Near Field Communication (NFC) and Global Positioning System (GPS) [PDF]

open access: yesJurnal Jaringan Telekomunikasi, 2023
A key is a tool made of metal to open or fasten a door or object that has a lock by inserting it into the hole in the main key. The lock itself is usually used on doors, suitcases, or other objects that require security.
Hudiono Hudiono   +2 more
doaj   +3 more sources

Is the kernel-staples match a key-lock match? [PDF]

open access: yesChem Sci, 2018
We demonstrated the existence of homo-ligand–homo-kernel–hetero-staples phenomenon in metal nanoclusters and the remarkable change in their properties by subtle interfacial structure tailoring.
Zhuang S   +9 more
europepmc   +2 more sources

An Unusual Transorbital Penetrating Injury by House-key (lock): A Case Report with a Small Review of Literature. [PDF]

open access: yesJ Clin Diagn Res, 2015
Penetrating injuries of the brain are quite uncommon, comprising approximately 0.4% of all head injuries. In our case, a four-year-old boy who fell forward on a house-key (lock) accidentally while playing with some other children sustained a left sided ...
Sarkar S, Modi S, Seth AK, Panja S.
europepmc   +2 more sources

Key-Lock Colloids in a Nematic Liquid Crystal [PDF]

open access: yesPhys. Rev. E 95, 012606 (2017), 2016
The Landau-de Gennes free energy is used to study theoretically the effective interaction of a spherical "key" and an anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and consider planar degenerate and perpendicular anchoring conditions separately.
N. Silvestre   +2 more
arxiv   +3 more sources

Sterically stabilized lock and key colloids: A self-consistent field theory study [PDF]

open access: yes, 2011
A self-consistent field theory study of lock and key type interactions between sterically stabilized colloids in polymer solution is performed. Both the key particle and the lock cavity are assumed to have cylindrical shape, and their surfaces are uniformly grafted with polymer chains.
Fleer G. J., S. A. Egorov
arxiv   +3 more sources

Synthetic auxin herbicides : finding the lock and key to weed resistance [PDF]

open access: yesPlant Science, 2020
Synthetic auxin herbicides are designed to mimic indole-3-acetic acid (IAA), an integral plant hormone affecting cell growth, development, and tropism. In this review, we explore target site genes in the auxin signaling pathway including SCFTIR1/AFB, Aux/
Figueiredo, Marcelo R. A.   +7 more
core   +2 more sources

The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock [PDF]

open access: yesSensors, 2009
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module.
Shengyong Li   +5 more
doaj   +4 more sources

Home - About - Disclaimer - Privacy